Honeypot
Honeypot的相关文献在2002年到2022年内共计72篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、信息与知识传播
等领域,其中期刊论文71篇、会议论文1篇、相关期刊51种,包括无线互联科技、中国科技资源导刊、信息安全与通信保密等;
相关会议1种,包括第二届全国Web信息系统及其应用会议(WISA2005')等;Honeypot的相关文献由135位作者贡献,包括吴军强、唐海萍、张骏等。
Honeypot
-研究学者
- 吴军强
- 唐海萍
- 张骏
- 蔡芝蔚
- 刘彦保
- 吕政
- 唐勇
- 杨庚
- 潘立武
- 盛红岩
- 胡华平
- 贾坤
- 邓亚平
- 阮忠
- 陈实
- 马传龙
- 黎珂
- Bo Wei Niu
- Chao Xu
- CoolBoy
- Gbenga Ikuomenisan
- Hai Jiang
- Hao Liang Lan
- Hao Liu
- Jie Xu
- Jie Yin
- JoeKinsella
- Lu Lu Chen
- Men Han
- Mohan Li
- Peng Hui Li
- Penggang Sun
- Quanlong Guan
- Su Chen
- Tiantian Ji
- Wendi Wang
- Xiang Cui
- Xiao Feng Sun
- Xiaojun Pan
- Yanbin Sun
- Yasser Morgan
- Yu Han
- Zhong Yi Xu
- Zhongru Wang
- 于焕
- 刘胜利
- 刘飞飞
- 卢锡城
- 原慧琴
- 吴震
-
-
Peng Hui Li;
Jie Xu;
Zhong Yi Xu;
Su Chen;
Bo Wei Niu;
Jie Yin;
Xiao Feng Sun;
Hao Liang Lan;
Lu Lu Chen
-
-
摘要:
At present,the severe network security situation has put forward high requirements for network security defense technology.In order to automate botnet threat warning,this paper researches the types and characteristics of Botnet.Botnet has special characteristics in attributes such as packets,attack time interval,and packet size.In this paper,the attack data is annotated by means of string recognition and expert screening.The attack features are extracted from the labeled attack data,and then use K-means for cluster analysis.The clustering results show that the same attack data has its unique characteristics,and the automatic identification of network attacks is realized based on these characteristics.At the same time,based on the collection and attribute extraction of Botnet attack data,this paper uses RF,GBM,XGBOOST and other machine learning models to test the warning results,and automatically analyzes the attack by importing attack data.In the early warning analysis results,the accuracy rates of different models are obtained.Through the descriptive values of the three accuracy rates of Accuracy,Precision,and F1_Score,the early warning effect of each model can be comprehensively displayed.Among the five algorithms used in this paper,three have an accuracy rate of over 90%.The three models with the highest accuracy are used in the early warning model.The research shows that cyberattacks can be accurately predicted.When this technology is applied to the protection system,accurate early warning can be given before a network attack is launched.
-
-
Gbenga Ikuomenisan;
Yasser Morgan
-
-
摘要:
The growing interest in Honeypots has resulted in increased research, and consequently, a large number of research surveys and/or reviews. Most Honeypot surveys and/or reviews focus on specific and narrow Honeypot research areas. This study aims at exploring and presenting advances and trends in Honeypot’s research and development areas. To this end, a systematic methodology and meta-review analysis were applied to the selection, evaluation, and qualitative examination of the most influential Honeypot surveys and/or reviews available in scientific bibliographic databases. A total of 188 papers have been evaluated and 22 research papers are found by this study to have a higher impact. The findings of the study suggest that the Honeypot survey and/or review papers of considerable relevance to the research community were mostly published in 2018, by IEEE, in conferences organized in India, and included in the IEEE Xplore database. Also, there have been few qualities Honeypot surveys and/or reviews published after 2018. Furthermore, the study identified 10 classes of vital and emerging themes and/or key topics in Honeypot research. This work contributes to research efforts employing established systematic review and reporting methods in Honeypot research. We have included our meta-review methodology, in order to allow further work in this area aiming at a better understanding of the progression of Honeypot research and advances.
-
-
Yu Han;
Tiantian Ji;
Zhongru Wang;
Hao Liu;
Hai Jiang;
Wendi Wang;
Xiang Cui
-
-
摘要:
A smart contract honeypot is a special type of smart contract.This type of contract seems to have obvious vulnerabilities in contract design.If a user transfers a certain amount of funds to the contract,then the user can withdraw the funds in the contract.However,once users try to take advantage of this seemingly obvious vulnerability,they will fall into a real trap.Consequently,the user’s investment in the contract cannot be retrieved.The honeypot induces other accounts to launch funds,which seriously threatens the security of property on the blockchain.Detection methods for honeypots are available.However,studying the manner by which to defend existing honeypots is insufficient to fight against honeypots.The new honeypots that may appear in the future from the perspective of an attacker must also be predicted.Therefore,we propose a type of adversarial honeypot.The code and behavioral features of honeypots are obtained through a comparative analysis of the 158,568 nonhoneypots and 352 honeypots.To build an adversarial honeypot,we try to separately hide these features and make the honeypot bypass the existing detection technology.We construct 18 instances on the basis of the proposed adversarial honeypot and use an open-source honeypot detection tool to detect these instances.The experimental result shows that the proposed honeypot can bypass the detection tool with a 100%ratio.Therefore,this type of honeypot should be given attention,and defensive measures should be proposed as soon as possible.
-
-
Yanbin Sun;
Xiaojun Pan;
Chao Xu;
Penggang Sun;
Quanlong Guan;
Mohan Li;
Men Han
-
-
摘要:
The security issues of industrial control systems(ICSs)have become increasingly prevalent.As an important part of ICS security,honeypots and anti-honeypots have become the focus of offensive and defensive confrontation.However,research on ICS honeypots still lacks breakthroughs,and it is difficult to simulate real ICS devices perfectly.In this paper,we studied ICS honeypots to identify and address their weaknesses.First,an intelligent honeypot identification framework is proposed,based on which feature data type requirements and feature data acquisition for honeypot identification is studied.Inspired by vulnerability mining,we propose a feature acquisition approach based on lightweight fuzz testing,which utilizes the differences in error handling between the ICS device and the ICS honeypot.By combining the proposed method with common feature acquisition approaches,the integrated feature data can be obtained.The experimental results show that the feature data acquired is effective for honeypot identification.
-
-
-
郑琦
-
-
摘要:
信息安全技术是现代军队信息化建设的重点问题。本文对Honeynet技术在海上技术信息网络安全中的应用进行研究。Honeynet技术具有主动防御、伪装性强、交互性好等特点。结合海上军事信息网络的特点,给出一种基于虚拟机的海上军事Honeynet系统的设计方案与实现方法,该系统使得海上军事信息网络安全能够摆脱对硬件设备及环境的要求,有效提高海上军事网络的防御能力。
-
-
-
-
张骏;
陈实;
郭岳东
-
-
摘要:
主动防御技术是近年来网络安全领域发展中的一种新技术.文章以Honeypot为基础,建立系统模型,重点对数据控制进行了优化设计.数据控制是本系统中最关键的一环,优化设计采用数据重定向功能和数据包抑制设计,既能灵活诱骗攻击者的攻击行为,又能对其攻击活动进行一定的限制,大大降低Honeypot带来的安全风险.
-
-
-
高俊峰;
胡华平;
唐勇
- 《第二届全国Web信息系统及其应用会议(WISA2005')》
| 2005年
-
摘要:
本文介绍了一种基于Honeypot和朴素贝叶斯分类器的扫描检测方法.其基本思想是部署大量的Honeypot而捕捉可能的网络扫描行为.通过对Honeypot的所有事件进行集中的分析,利用朴素贝叶斯分类器进行分类,从而判定出扫描的行为.实验结果表明,使用这种方法有较好的分类精度,可以检测多类扫描攻击.
-
-
高俊峰;
胡华平;
唐勇
- 《第二届全国Web信息系统及其应用会议(WISA2005')》
| 2005年
-
摘要:
本文介绍了一种基于Honeypot和朴素贝叶斯分类器的扫描检测方法.其基本思想是部署大量的Honeypot而捕捉可能的网络扫描行为.通过对Honeypot的所有事件进行集中的分析,利用朴素贝叶斯分类器进行分类,从而判定出扫描的行为.实验结果表明,使用这种方法有较好的分类精度,可以检测多类扫描攻击.
-
-
高俊峰;
胡华平;
唐勇
- 《第二届全国Web信息系统及其应用会议(WISA2005')》
| 2005年
-
摘要:
本文介绍了一种基于Honeypot和朴素贝叶斯分类器的扫描检测方法.其基本思想是部署大量的Honeypot而捕捉可能的网络扫描行为.通过对Honeypot的所有事件进行集中的分析,利用朴素贝叶斯分类器进行分类,从而判定出扫描的行为.实验结果表明,使用这种方法有较好的分类精度,可以检测多类扫描攻击.
-
-
高俊峰;
胡华平;
唐勇
- 《第二届全国Web信息系统及其应用会议(WISA2005')》
| 2005年
-
摘要:
本文介绍了一种基于Honeypot和朴素贝叶斯分类器的扫描检测方法.其基本思想是部署大量的Honeypot而捕捉可能的网络扫描行为.通过对Honeypot的所有事件进行集中的分析,利用朴素贝叶斯分类器进行分类,从而判定出扫描的行为.实验结果表明,使用这种方法有较好的分类精度,可以检测多类扫描攻击.
-
-
高俊峰;
胡华平;
唐勇
- 《第二届全国Web信息系统及其应用会议(WISA2005')》
| 2005年
-
摘要:
本文介绍了一种基于Honeypot和朴素贝叶斯分类器的扫描检测方法.其基本思想是部署大量的Honeypot而捕捉可能的网络扫描行为.通过对Honeypot的所有事件进行集中的分析,利用朴素贝叶斯分类器进行分类,从而判定出扫描的行为.实验结果表明,使用这种方法有较好的分类精度,可以检测多类扫描攻击.
-
-
高俊峰;
胡华平;
唐勇
- 《第二届全国Web信息系统及其应用会议(WISA2005')》
| 2005年
-
摘要:
本文介绍了一种基于Honeypot和朴素贝叶斯分类器的扫描检测方法.其基本思想是部署大量的Honeypot而捕捉可能的网络扫描行为.通过对Honeypot的所有事件进行集中的分析,利用朴素贝叶斯分类器进行分类,从而判定出扫描的行为.实验结果表明,使用这种方法有较好的分类精度,可以检测多类扫描攻击.